Installation & Debugging

Chapter 11 — Core Switch Security Hardening Design Guide


The installation and initial configuration of a core switch is a high-risk activity that requires careful planning, precise execution, and systematic verification at each step. Errors made during installation — such as incorrect cable routing, missing grounding, or applying the wrong configuration template — can result in security gaps that persist for years without detection. This chapter provides a structured installation procedure, environmental requirements, and a systematic debugging methodology for resolving the most common issues encountered during core switch security hardening deployments.

11.1 Installation Requirements — Real-World Scene

The installation scene below illustrates the correct professional approach to core switch installation in a production data center environment. Key elements visible in the scene include: engineers wearing ESD protection (wrist straps and anti-static mats), proper use of cable management tools, color-coded fiber optic cables with correct bend radius, organized vertical and horizontal cable managers, and a professional tool cart with all required installation tools staged and accessible. The data center environment features proper hot/cold aisle containment, raised floor for cable routing, and overhead cable trays for fiber management.

Core Switch Installation Requirements — Professional Data Center Installation Scene
Figure 11.1: Installation Requirements — Professional Data Center Scene Showing Two Engineers Installing Core Switch with ESD Protection, Color-Coded Fiber Cables (Blue SMF, Orange MMF), Organized Cable Management, Anti-Static Mat, Tool Cart, and Proper Hot/Cold Aisle Data Center Environment

11.2 Environmental and Physical Installation Requirements

The physical installation environment must meet specific requirements before the core switch is installed. Failure to meet these requirements can result in hardware failures, security vulnerabilities, or operational problems that are difficult to diagnose after the fact. The following table defines the minimum environmental requirements and the verification method for each.

Requirement CategorySpecificationMinimum StandardVerification Method
TemperatureOperating temperature range18°C – 27°C (64°F – 81°F) at inletCalibrated thermometer at rack inlet; continuous monitoring
HumidityRelative humidity40% – 60% RH non-condensingCalibrated hygrometer; data center DCIM system
AirflowHot/cold aisle containmentFront-to-back airflow; no hot air recirculationSmoke pencil test; thermal imaging camera
PowerRedundant power feedsDual independent power circuits (A-feed + B-feed); separate PDUsVerify circuit breaker labels; test each feed independently
GroundingEquipment groundingChassis ground to rack ground bar; rack ground to facility groundContinuity test with multimeter; resistance <1 Ω
Rack SpaceU-space availabilityRequired U-space + 2U above and below for airflow clearancePhysical measurement; rack elevation diagram
Physical SecurityRack access controlLocked rack door; access log; CCTV coverageVerify lock functionality; review access log; verify camera coverage
ESD ProtectionAnti-static measuresESD wrist strap; anti-static mat; ESD-safe tool kitTest ESD strap with wrist strap tester before each use

11.3 Step-by-Step Installation Procedure

The following installation procedure must be followed in sequence. Each step must be completed and verified before proceeding to the next step. The procedure is designed to minimize the risk of security gaps by ensuring that hardening controls are applied before the switch is connected to the production network.

StepActionVerificationNotes
1Verify hardware and software against pre-deployment checklist (Chapter 10)All checklist items signed offDo not proceed if any item fails
2Install rack rails and mounting hardwareRails level and secure; torque to specificationUse torque screwdriver; do not over-tighten
3Install chassis into rack with at least 2 peopleChassis seated on rails; all mounting screws installedChassis weight may exceed 20kg; use lift if available
4Connect chassis ground cable to rack ground barContinuity test passes; resistance <1 ΩGround before connecting power
5Connect power cables (A-feed first, then B-feed)Power supply LEDs green; no fault indicatorsVerify correct feed assignment before connecting
6Connect OOB management cable to console portConsole session established; login prompt visibleUse OOB management network only; not production network
7Apply baseline hardening configuration via consoleConfig applied without errors; all hardening controls activeUse approved baseline template; do not modify during deployment
8Verify AAA, NTP, and syslog connectivity via OOBAll supporting systems reachable and functionalDo not connect to production network until this step passes
9Connect uplink interfaces to firewall/distribution (one at a time)Each interface comes up; routing adjacencies establishedMonitor syslog for unexpected events during each connection
10Run post-deployment acceptance tests (Chapter 10)All acceptance tests pass (100% pass rate)Document all test results; obtain sign-off before traffic migration
11Install physical security accessories (port blockers, tamper seals)All unused ports blocked; tamper seals applied and photographedPhotograph all seals for baseline record
12Complete installation documentation and sign-offAll documentation complete; both engineer and security team sign offRetain documentation for audit; store in configuration management system

11.4 Common Issues and Debugging Guide

The following table presents the most common issues encountered during core switch security hardening installations, their root causes, and the recommended debugging steps. This guide is intended to accelerate issue resolution and prevent engineers from inadvertently weakening security controls while troubleshooting.

IssueSymptomRoot CauseDebugging StepsResolution
Management lockoutCannot SSH to switch; AAA server unreachableAAA server down; network path to AAA unavailable; misconfigured AAA1. Try console access; 2. Check AAA server status; 3. Verify OOB network path; 4. Check AAA configUse console with local emergency account; restore AAA connectivity; verify fallback config
BGP session not establishingBGP neighbor stuck in Active stateMD5 key mismatch; incorrect neighbor IP; ACL blocking BGP port 1791. Check BGP auth key on both ends; 2. Verify neighbor IP; 3. Check ACL for TCP 179; 4. Verify routing to peerCorrect MD5 key; fix neighbor IP; update ACL to permit BGP
CoPP dropping legitimate trafficRouting protocol flaps; management sessions timing outCoPP rate limits set too low; traffic burst exceeds configured rate1. Check CoPP drop counters per class; 2. Identify which class is dropping; 3. Verify traffic is legitimateIncrease rate limit for affected class; use Chapter 9 CoPP calculator to recalculate
BPDU Guard false positiveAccess port enters err-disabled; no rogue switch connectedIP phone or other device sending BPDUs; incorrect port type config1. Check what device is connected; 2. Verify port type (access vs. trunk); 3. Check device BPDU behaviorConfigure portfast only on true access ports; disable BPDU on IP phone if supported
Syslog events not received at SIEMSIEM shows no events from switch; switch syslog buffer fillingSyslog server IP incorrect; TLS certificate mismatch; firewall blocking syslog port1. Verify syslog destination IP; 2. Check TLS certificate validity; 3. Test connectivity to syslog port 6514Correct syslog destination; renew/replace TLS certificate; update firewall rules
TCAM exhaustionRoutes or ACL entries silently dropped; forwarding anomaliesTCAM capacity exceeded; too many routes, ACL entries, or features enabled1. Check TCAM utilization (show platform tcam); 2. Use Chapter 9 TCAM calculator; 3. Identify largest consumersReduce ACL entries; summarize routes; disable unused features; upgrade platform if needed